Archive for password cracking

You are browsing the archives of password cracking.

Password Strength Requirements

While the main premise of the article linked below is correct, it understates a key part of password cracking methodology. There are two primary means of cracking passwords: using word lists, and brute force. There are also many hybrid combinations, which is an important focus of the article. In brute force cracking, every element of […]

GPU Password Cracking

Using GPUs to aid in password cracking continues to become more effective in both speed and cost. GPU Password Cracking – Bruteforceing a Windows Password Using a Graphic Card – [mytechencounters.wordpress.com] GPGPU computing is getting lots of attention these days. GPGPU computing simply means doing general calculations on graphic cards (GPUs) rather than CPUs. Traditionally, […]

Password Cracking

Generally, password cracking takes place in the ENTRENCH phase of the attack, after an initial penetration has been successful and password hashes have been retrieved from the compromised system, but it can be done at any point if it will yield results and hashes are available. The attacker will probably need admin/root level access, but […]

ophcrack

Ophcrack is a free and open source tool that can be used either within an existing OS (linux, Windows, OS X) environment or as a live-CD that boots its own version of linux. Either way, it has the ability to retrieve Windows password hashes and crack both LM and NT versions using a set of […]

john the ripper

John the ripper is a password hash cracking tool that is available free for both unix/linux and Windows platforms. It autodetects the type of hash and by default uses a hybrid approach of dictionary and brute force attacks to attempt to crack the hash as quickly and efficiently as possible. It can use a wide […]

Cain and Abel

Cain & Abel A suprisingly robust suite of tools, Cain and Able is often simply characterized as a password recovery/cracking tool, but if you take a look at the list of features below, you’ll see it is much more than that. The sniffing component of Cain collects a LOT of information and any password hashes […]